Microsoft investigates spammers with trick computer
- Book ID
- 104392228
- Publisher
- Elsevier Science
- Year
- 2005
- Tongue
- English
- Weight
- 277 KB
- Volume
- 2005
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
β¦ Synopsis
Microsoft investigates spammers by trapping them with a computer
Microsoft has traced the source of zombie botnet masters by sacrificing a lone computer.
The computer trap enabled Microsoft to trace bot hackers in the act of compromising the PC. The Redmond giant then filed lawsuits against unidentified spammers who used remotely compromised zombie computers to send junk emails. Tim Cranton, Director of Microsoft's Internet Safety Enforcement Program said:"By inserting ourselves in the spammers' path and looking upstream, we have been able to see things we have never been able to see before." Turn to page 2...
Return on security investment -time to get the measure of it
The pressure is mounting on security professionals to justify what they spend. But up to now proving return on investment has proved very tricky -and frustrating.
Certain methods of demonstrating a return on investment -often termed return on security investment (ROSI) -have been advanced, but use remains limited. As a result, security projects are often justified on fear, uncertainty and doubt. Justifying investment can be problematic because information security often delivers non-financial benefits, rather than an increase in revenue or a reduction in costs. Also, there is a lack of clear guidance about calculating the financial benefits of information security activities -not to mention the fact that security professionals usually don't have a financial background. Before reviewing some key purchasing trends, we take a look at a fresh approach, backed by many global corporations, to getting ROSI on track. Turn to page 8...
Featured this month
Microsoft investigates spammers with trick computer 1 Espionage-linked silent exploits grow in threat potential 2 DoS attack not illegal, says judge 3 FEATURES Biometrics Biometrics for enterprise security 4 Return on Investment Return on security investmentproving it's worth it 8
π SIMILAR VOLUMES
It Is Our Belief That Researchers And Practitioners Acquire, Through Experience And Word-of-mouth, Techniques And Heuristics That Help Them Successfully Apply Neural Networks To Di Cult Real World Problems. Often These \tricks Are Theo- Tically Well Motivated. Sometimes They Are The Result Of Trial
The twenty last years have been marked by an increase in available data and computing power. In parallel to this trend, the focus of neural network research and the practice of training neural networks has undergone a number of important changes, for example, use of deep learning machines. The secon